Last active
February 8, 2018 04:49
-
-
Save buxu/04ce809eb8b32ef57e232eab5e61f023 to your computer and use it in GitHub Desktop.
Privilege escalation on Citrix NetScaler VPX through SSRF vulnerability
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[+] buxuqua (@Buxu) | |
[Suggested description] | |
By an SSRF attack, an attacker can perform Privilege escalation attack to the nsroot user. And by the nsroot user, an attacker can execute remote commands with root privileges of OS. | |
------------------------------------------ | |
[VulnerabilityType Other] | |
Privilege Escalation to RCE | |
------------------------------------------ | |
[Vendor of Product] | |
Citrix NetScaler | |
------------------------------------------ | |
[Affected Product Code Base] | |
NetScaler VPX - <= NS12.0 53.13.nc | |
------------------------------------------ | |
[Affected Component] | |
/rapi/read_url | |
------------------------------------------ | |
[Attack Type] | |
Remote | |
------------------------------------------ | |
[Impact Code execution] | |
true | |
------------------------------------------ | |
[Impact Escalation of Privileges] | |
true | |
------------------------------------------ | |
[Attack Vectors] | |
to exploit this vulnerability, an attacker must have a account on the Citrix | |
NetScaler VPX webapp (this account doesn't have any permission on webapp) | |
------------------------------------------ | |
[Has vendor confirmed or acknowledged the vulnerability?] | |
true |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment